首页>
外国专利>
Detecting compromised credentials in a credential stuffing attack
Detecting compromised credentials in a credential stuffing attack
展开▼
机译:在凭证填充攻击中检测受损凭证
展开▼
页面导航
摘要
著录项
相似文献
摘要
Techniques are provided for detecting compromised credentials in a credential stuffing attack. A set model is trained based on a first set of spilled credentials. The set model does not comprise any credential of the first set of spilled credentials. A first request is received from a client computer with a first candidate credential to login to a server computer. The first candidate credential is tested for membership in the first set of spilled credentials using the set model. In response to determining the first set of spilled credentials includes the first candidate credential using the set model, one or more negative actions is performed.
展开▼